SafeWallet released bybit Hack Post-mortem report

Safewallet’s developer released a post-mortem report detailing the exploitation of cybersecurity led to a $ 1.4 billion hack against Bybit in February.
According to a forensic Assessment Performed by SafeWallet and cybersecurity firm Mandiant, the hacking team posted a safe Amazon Web Services (AWS) session session to prevent multifactor validation security measures set by the firm.
SAFEWALLET settings require team members to redefine their AWS session tokens every 12 hours, which motivates the hacking team to test a violation by registering a multifactor authentication (MFA) device.
Following many failed attempts at registering an MFA device, the threat actors The developer’s MacOS system is compromisedIt is likely that the malware is installed on the system, and the AWS session tokens used while developer sessions are active.
When hackers get access, they worked within the Amazon Web Services environment to set up the attack.
A timeline of safe exploitation of developer security. Source: Safe
Mandiant’s forensic analysis also confirmed that hackers are North Korean state actors who lasted 19 days to prepare and carry out the attack.
The latest update has reinstated that the exploitation of cybersecurity does not affect smart safe contracts and adds that the safe development group puts additional care cares following what is Biggest hack in crypto history.
Related: Crypto lost to exploits, scams, that -The $ 1.5B in February with Bybit Hack: Certik
The FBI places an alert as bybit hackers launder funds
The US Federal Bureau of Investigation (FBI) has published an online alert Asking node operators to block transactions From the addresses of the wallet linked to North Korea hackers, the FBI said it was laundered and converted to Fiat Currency.
The FBI warned about North Korea hackers behind bybit hack. Source: FBI
Since at that time bybit hackers Laundered 100% of stolen cryptoconsisting of about 500,000 ether -related tokens, in just 10 days.
On March 4, Bybit CEO Ben Zhou said that around 77% of funds, worth about $ 1.07 billion, will still be monitored Onchain, while approximately $ 280 million is dark.
However, Deddy Lavid, CEO of the Cyvers cybersecurity firm, said cybersecurity teams said they could still monitor and refreeze some of the stolen funds.
Magazine: Lazarus Group’s favorite exploitation is revealed – Crypto hacks review